hashcat Forum

Full Version: Help with optimizing dict attack
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello, new to this great forum :)

I'm trying to figure out a way to optimize an attempt to recover my Truecrypt password. Been doing this with hashcat for a year or so but no success.

* I have used a password with about 30 possible known words in combination. ex (dog, cat, 5000, frog, 12)
* Maybe there is also spaces between every word but maybe not.
* There are NO words used more than one time in the password.
* There are NO spaces in a row but maybe between the words. ("catdog12" orĀ  "cat dog 12")
* The length of the password is between 15-30 characters.
* Since some words are long and some short it would be possible to exclude a lot of combinations.

I'm trying with "hashcat64 -a0 -m6211 badluck.tc mywordlist.txt"

I use OTFBrutusGUI to build different password lists. Up to about 50GB in size. I like the wordlist building that it does and I'm also used to that program since I used it before GPU-truecypt was possible.

Would be so great to get some advice on my project to find the password.


Thanks in advance!
Try with prince and use the words in the basewords with and without spaces at the end
Ok, thanks for the advice. Have tried prince before, will give it a try again.
So prince should be able to have a big wordlist and run for days or weeks.
Just asking because I had some problem running it for long periods.


(10-25-2018, 07:21 AM)atom Wrote: [ -> ]Try with prince and use the words in the basewords with and without spaces at the end